My Account Details

ISBN10: 0071846778 | ISBN13: 9780071846776

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. A Complete People-Centric Information Security Culture Toolkit Minimize risk, protect corporate assets, and avoid catastrophic cybersecurity incidents by adopting a program philosophy that stresses the human element of security. People-Centric Security: Transforming Your Enterprise Security Culture shows, step-by-step, how to analyze and articulate your organization’s cultural security posture and migrate to a reliable, people-focused data protection model. Discover how to develop a structured implementation strategy, build behavioral models, identify problems, and transform security effectiveness. This practical guide includes downloadable templates, surveys, and metrics. Explore the people, processes, and technologies behind successful information security culture Analyze your security cultures and subcultures and identify conflicts and risks Launch a security culture diagnostic project and interpret the results Implement the Competing Security Cultures Framework Gather data and create maps using Security Culture Diagnostic Surveys Build Security FORCE Behavioral Models and use FORCE diagnostic tools Assess security through the five FORCE values: failure, operations, resilience, complexity, and expertise Facilitate people-centric security at the leadership level of your enterprise
Chapter 1: Information Security: Adventures in Culture Hacking
Chapter 2: Strategy for Breakfast: The Hidden Power of Security Culture
Chapter 3: Organizational Culture: A Primer
Chapter 4: People-Centric Security
Part II: Measuring Your Security Culture
Chapter 5: The Competing Security Cultures Framework
Chapter 6: The Security Culture Diagnostic Toolkit (SCDT)
Chapter 7: Creating Culture Maps with the Security Culture Diagnostic Toolkit
Chapter 8: Using the SCDT
Part III: Transforming Your Security Culture
Chapter 9: From Diagnosis to Transformation: Implementing People-Centric Security
Chapter 10: Security FORCE - A Behavioral Model for People-Centric Security
Chapter 11: The Security Value of Failure
Chapter 12: The Security Value of Operations
Chapter 13: The Security Value of Resilience
Chapter 14: The Security Value of Complexity
Chapter 15: The Security Value of Expertise
Chapter 16: Behavior and Culture: Mastering People-Centric Security
Chapter 17: Leadership, Power and Influence in People-Centric Security
Chapter 18: A People-Centric Future
Need support? We're here to help - Get real-world support and resources every step of the way.